Advertisement
opexxx

secArchtect.JOBDescription

Jun 26th, 2017
256
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.01 KB | None | 0 0
  1. Requisition ID 1638781 Posting Date 06/06/2017 Category Services Location Toronto, Ontario | Canada Schedule Full-time Employee Status Day Job
  2.  
  3. DXC Technology Security Advisory Services is seeking a Security Architecture consultant to work on and lead Security Architecture consulting projects for commercial customers. We are looking for an innovative and motivated consultant who under general direction with a high level of autonomy, uses extensive knowledge and skills obtained through education and experience to perform the necessary assessment, collaboration, analysis, advisory, and consulting tasks related to specific customer security problems, regulations, industry standards and/or a customer’s unique situation or requirements.
  4.  
  5. DXC Technology Security Advisory Services aspires to be a strategic partner in helping our more than 1,000 business and government clients in 70 countries better serve their customers and citizens. We work to overcome their business challenges, collaborating to make technology work for them, anytime and anywhere. With a dedication to quality and innovation, we deliver information security advisory, systems integration, and applications development. These efforts enable organizations to manage risk as they take the best advantage of cloud computing, information optimization and enhanced security measures to achieve their goals in a digital world.
  6.  
  7. Responsibilities
  8.  
  9. Analyze complex enterprise environments from an information security perspective.
  10.  
  11. Develop, implement and/or oversee the implementation of Enterprise Security Strategy.
  12.  
  13. Delivering Security Architectures/Strategies as part of a broader Enterprise or IS/IT Architecture which encompass People, Process and Technology components.
  14.  
  15. Undertake Threat, Vulnerability and Risk analysis methodologies/techniques and the interpretation/application of their output in the definition of Security Architectures.
  16.  
  17. Architect solutions and lead security projects at an enterprise level, ensuring that the customer's security requirements are met.
  18.  
  19. Rationalize different security solutions against requirements, risk, and constraints. Build business justification to support continued investment in security.
  20.  
  21. Develop security roadmaps for customers which will enable them to execute upon strategies developed.
  22.  
  23. Work with key customer executives, directors and management teams (i.e., CISO, CSO, Security Director, etc.) to ensure a business-level understanding of their requirements are understood and that any solutions provided manage risk and address the needs of the business.
  24.  
  25. Security Architecture and/or Enterprise Architectural Frameworks (e.g. SABSA, TOGAF, O-ESA).
  26.  
  27. Experience designing and implementing Security Solutions through to operation, experience in multi-supplier/multi-platform environments would be advantageous.
  28.  
  29. A high level knowledge of all key areas of Information Security Technology and an ability to apply them appropriately.
  30.  
  31. Interpreting and applying appropriate Standards, Policies and Legislation, e.g. ISO27001, NIST CSF, PCI DSS, GDPR etc. in the development of security strategies.
  32.  
  33. Experience with Harmonized Threat and Risk Assessment (HTRA) desirable.
  34.  
  35.  
  36.  
  37. Experience with PIPEDA desirable.
  38.  
  39.  
  40.  
  41. An understanding of the people, process & technology involved in Security Strategy, Risk Management, and Security Operations.
  42.  
  43. Demonstrable experience in leading large consultancy delivery teams and projects.
  44.  
  45. Understanding of basic financial analysis in support of providing cost estimations in delivery of large-scale security programs and associated activities.
  46.  
  47. Ability to develop new portfolio solutions from concept to market (methodology development, marketing, sales/internal training, etc.)
  48.  
  49. Demonstrable experience in “soft” consultancy skills (i.e., deliverable generation, communications, executive level presentation development/delivery).
  50.  
  51. Experience and knowledge of security management frameworks in multiple industries like finance, pharma, manufacturing, travel/transportation, retail or insurance.
  52.  
  53. Able to build information security documentation and convey complex information security topics in a simple effective manner.
  54.  
  55. Information Security and regulatory compliance consultancy experience.
  56.  
  57. Working knowledge of common risk assessment frameworks/methodologies such as FAIR, OCTAVE, CRAMM, COBIT, NIST SP 800-30, ISRM, ISO 31000.
  58.  
  59. Working knowledge of common IT security impacted regulations and/or standards such as HIPAA/HITECH, PCI, Sarbanes-Oxley, GLBA and GDPR.
  60.  
  61. Working knowledge of common IT Governance frameworks such as COBIT, ISO 20000, ITIL.
  62.  
  63. Cloud Security experience desirable.
  64.  
  65. Appreciation of trends in IT security, IT risk management, and security architecture.
  66.  
  67. Self-motivated individual who is keen to take ownership of allocated tasks and drive them to completion.
  68.  
  69. Key industry certifications such as CISSP, ISSAP, CISM, CRISC, CISA, CCSK, TOGAF certified Architect, CCSP, are desirable.
  70.  
  71.  
  72.  
  73. About DXC Technology
  74.  
  75. Thanks for taking the time to review our job, if you think it is a match to your experience and interests please apply today— we are eager to learn more about you! If you know a friend who may be a fit for the job please refer them.
  76.  
  77. Please note the above statements describe the general nature and level of work only. They are not a complete list of all required responsibilities, duties and skills. Other duties may be added, or this description amended at any time.
  78.  
  79.  
  80.  
  81. Please Note
  82.  
  83. In order to satisfy our contractual obligations with clients, the successful candidate will be required to pass a basic, standard Criminal Records check. You will also be required to sign off on DXC’s Confidentiality, Non-Solicitation and Conflict of Interest Agreement.
  84.  
  85. DXC is an equal opportunity employer. We welcome the many dimensions of diversity.
  86.  
  87. Accommodation of special needs for qualified candidates may be considered within the framework of the DXC Accommodation Policy.
  88.  
  89.  
  90.  
  91. EEO Tagline: DXC Technology is EEO F/M/Protected Veteran/ Individual with Disabilities
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement